On guess and determine cryptanalysis of LFSR-based stream ciphers (original) (raw)

Algebraic Cryptanalysis Of Stream Ciphers With Non Linear Update

Mehreen Afzal

2010

View PDFchevron_right

Udc 621.391:519.7 on the Computational Security of Randomized Stream Ciphers Proposed by Mihaljević and Imai

Sergey Gryshakov

2015

View PDFchevron_right

Aiden A. Bruen and Mario A. Forcinito, Cryptography, Information Theory, and Error-Correction a Handbook for the 21st Century, John Wiley & Sons, Inc. (2005) ISBN 0-471-65317-9

Mario Forcinito

Information Processing and Management, 2007

View PDFchevron_right

Fast Algebraic Attacks on Stream Ciphers With Linear Feedback

Nicolas T. Courtois

Advances in Cryptology-CRYPTO 2003, 2003

View PDFchevron_right

Cryptanalysis of the F-FCSR Stream Cipher Family

Eliane Jaulmes

Lecture Notes in Computer Science, 2006

View PDFchevron_right

An Analysis of Linear Feedback Shift Registers in Stream Ciphers

Dr. Shadab Alam

International Journal of Computer Application- IJCA, 2012

View PDFchevron_right

Cryptanalysis of Stream Ciphers with Linear Masking

Charanjit Jutla

Lecture Notes in Computer Science, 2002

View PDFchevron_right

Some security results of the RC4+ stream cipher

Sonu Jha

Security and Communication Networks, 2015

View PDFchevron_right

Analysis and Design of Symmetric Cryptographic Algorithms

Manoj Gelli

View PDFchevron_right

IJERT-Design of a Lightweight Stream Cipher: BOKHARI 256

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2020

View PDFchevron_right

ABC: A new fast flexible stream cipher, Specification Version 2

Vladimir Anashin

View PDFchevron_right

IJERT-Design and Implementation of a Secure Stream Cipher for Cryptographic Applications

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2015

View PDFchevron_right

An analysis of linear feedback shift register in stream ciphers

Faheem Masoodi

View PDFchevron_right

On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

Souvik Ray

Designs, Codes and Cryptography, 2017

View PDFchevron_right

New constructions in linear cryptanalysis of block ciphers

Zbigniew Kotulski

2000

View PDFchevron_right

Progress in Cryptology - INDOCRYPT 2008

Abhijit Abhik Das

Lecture Notes in Computer Science, 2008

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers

Nicolas T. Courtois

AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005

View PDFchevron_right

Rewriting variables: The complexity of fast algebraic attacks on stream ciphers

P. Hawkes

Advances in Cryptology–CRYPTO 2004, 2004

View PDFchevron_right

Security Primitives: Block And Stream Ciphers

Mehak Khurana

View PDFchevron_right

Block Ciphers: Analysis, Design and Applications

Lars Knudsen

DAIMI Report Series, 1994

View PDFchevron_right

Cryptanalysis of block ciphers: A survey

Jean-jacques Quisquater

2003

View PDFchevron_right

AN ANALYSIS OF THE CONSTRUCTION OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS FOR STREAM CIPHERS

Mehreen Afzal

View PDFchevron_right

An approach for stream ciphers design based on joint computing over random and secret data

Miodrag Mihaljevic

Computing, 2009

View PDFchevron_right

Algebraic attacks on the crypto-1 stream cipher in mifare classic and oyster …

Nicolas T. Courtois

Early announcement of a research in …, 2008

View PDFchevron_right

Grain -A Stream Cipher for Constrained Environments

RAMEEZ IFTIKHAR

View PDFchevron_right

Probabilistic Factors in the Sober-t Stream Ciphers

Steve Babbage

2002

View PDFchevron_right

Algebraic Cryptanalysis of A NLFSR Based Stream Cipher

Ashraf Masood

2008

View PDFchevron_right

Signal Processing Techniques in Cryptography

Konstantinos Limniotis

View PDFchevron_right

Heuristic guess-and-determine attacks on stream ciphers

hadi ahmadi

Iet Information Security, 2009

View PDFchevron_right

An Exquisite Cryptographic Algorithm for Lesser Amount of Data

Akhil Kaushik

IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011, 2011

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Cipher Components

Nicolas Courtois

Advanced Encryption Standard–AES, 2005

View PDFchevron_right

Probabilistic Versus Deterministic Algebraic Cryptanalysis—A Performance Comparison

Enes Pasalic

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

Proposal of a New Block Cipher reasonably Non-Vulnerable against Cryptanalytic Attacks

Angshu Sinha

ArXiv, 2012

View PDFchevron_right

Comparative Analysis of Structures And Attacks on Various Stream Ciphers

Faheem Masoodi

bvicam.ac.in, 4

View PDFchevron_right

Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems

Jaechul Sung

Telecommunication Systems, 2010

View PDFchevron_right